mirror of
https://gitlab.freedesktop.org/wayland/wayland.git
synced 2025-10-29 05:40:16 -04:00
connection: fix demarshal of invalid header
The size argument to wl_connection_demarshal() is taken from the message by the caller wl_client_connection_data(), therefore 'size' is untrusted data controllable by a Wayland client. The size should always be at least the header size, otherwise the header is invalid. If the size is smaller than header size, it leads to reading past the end of allocated memory. Furthermore if size is zero, wl_closure_init() changes behaviour and leaves num_arrays uninitialized, leading to access of arbitrary memory. Check that 'size' fits at least the header. The space for arguments is already properly checked. This makes the request_bogus_size test free of errors under Valgrind. Fixes: https://gitlab.freedesktop.org/wayland/wayland/issues/52 Signed-off-by: Pekka Paalanen <pekka.paalanen@collabora.com> Reviewed-by: Simon Ser <contact@emersion.fr>
This commit is contained in:
parent
446047edf2
commit
bace3cd819
2 changed files with 9 additions and 1 deletions
|
|
@ -695,6 +695,14 @@ wl_connection_demarshal(struct wl_connection *connection,
|
|||
struct wl_closure *closure;
|
||||
struct wl_array *array_extra;
|
||||
|
||||
/* Space for sender_id and opcode */
|
||||
if (size < 2 * sizeof *p) {
|
||||
wl_log("message too short, invalid header\n");
|
||||
wl_connection_consume(connection, size);
|
||||
errno = EINVAL;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
closure = wl_closure_init(message, size, &num_arrays, NULL);
|
||||
if (closure == NULL) {
|
||||
wl_connection_consume(connection, size);
|
||||
|
|
|
|||
|
|
@ -798,7 +798,7 @@ expect_error_recv(int sockfd, uint32_t expected_error)
|
|||
* However, running under Valgrind would point out invalid reads and use of
|
||||
* uninitialized values.
|
||||
*/
|
||||
FAIL_TEST(request_bogus_size)
|
||||
TEST(request_bogus_size)
|
||||
{
|
||||
struct wl_display *display;
|
||||
struct wl_client *client;
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue